MUGI trademarks | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks

exact MUGI exact MUGI

Trademarks matching 'mugi'

Summary of page content
2008-05-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded cd-roms and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely pci cards, set top boxes and satellite receivers, pc cards, lan cards, and wlan cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, pc cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely, smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards
606
ABANDONED - NO STATEMENT OF USE FILED
2012-04-09
2020-05-31
data visionbook hds systems ax system capital chime matic credit fleet services digital document factory foundation universal star network elite
2003-09-11
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded cd-roms and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely pci cards, set top boxes and satellite receivers, pc cards, lan cards, and wlan cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, pc cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards
606
ABANDONED - NO STATEMENT OF USE FILED
2008-06-02
2020-05-31
data visionbook hds systems ax system capital chime matic credit fleet services digital document factory foundation universal star network elite
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.